Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Hermit project | 1 | 4 | Application |
| Groupsession | 3 | 20 | Application |
| Parallelus | 1 | 1 | Application |
| Go git project | 1 | 4 | Application |
| Cart66 | 1 | 2 | Application |
| Shaklee product catalog project | 1 | 1 | Application |
| Linksys | 2 | 2 | Application |
| M phorum | 1 | 2 | Application |
| Wawacu | 1 | 1 | Application |
| Tinywall | 1 | 1 | Application |
| Easy faq with expanding text project | 1 | 1 | Application |
| Tuned studios | 7 | 7 | Application |
| Audacious media player team | 1 | 2 | Application |
| Extrakt | 1 | 1 | Application |
| Gmo pg | 1 | 2 | Application |
| Zendrop | 1 | 2 | Application |
| Simian systems inc | 3 | 3 | Application |
| Lscube | 1 | 1 | Application |
| Asandia | 1 | 1 | Application |
| Appcoins project | 1 | 1 | Application |